Static task
static1
Behavioral task
behavioral1
Sample
a2490ada048716e1efe4df3f8ba73b056976cd1be72acaea7c51c13c26cafd23.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2490ada048716e1efe4df3f8ba73b056976cd1be72acaea7c51c13c26cafd23.exe
Resource
win10v2004-20221111-en
General
-
Target
a2490ada048716e1efe4df3f8ba73b056976cd1be72acaea7c51c13c26cafd23
-
Size
15KB
-
MD5
ffc562f576dd9414f3abc694f04f0142
-
SHA1
91370d9ec8c0a118b35994db41f62df1d2836886
-
SHA256
a2490ada048716e1efe4df3f8ba73b056976cd1be72acaea7c51c13c26cafd23
-
SHA512
fcaa36d83fc0b009ff39282f43c083f5a22635e29d969725f5b8d962b3a724e8d64b120314feb880004a6436db7318c7fbcf802c0ac5eb9e7a87a2df333279b9
-
SSDEEP
192:h8NqieFQojIAOGwQy14YtKKKt5a9md8T1teuQ/m/sK4y6eNqNcxPqebN63/lVwJ5:WNz7P1g5/SsKlEg/bWwHXQcD
Malware Config
Signatures
Files
-
a2490ada048716e1efe4df3f8ba73b056976cd1be72acaea7c51c13c26cafd23.exe windows x86
6ff91414827ce5e8c7435d88f86da6e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
PulseEvent
TlsAlloc
DeleteFileA
GetACP
ReleaseMutex
IsBadStringPtrA
ResumeThread
GetDriveTypeA
HeapCreate
IsDebuggerPresent
lstrlenA
CancelIo
TlsGetValue
SuspendThread
CreateFileMappingA
GetStartupInfoA
GetModuleHandleA
CreateFileA
DeviceIoControl
user32
GetIconInfo
LoadImageA
PeekMessageA
DispatchMessageA
GetWindowLongA
DestroyMenu
IsWindow
DestroyWindow
FindWindowW
CallWindowProcW
DrawTextW
DispatchMessageA
IsZoomed
amstream
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
cryptui
LocalEnroll
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ